A REVIEW PAPER ONOFFLINE SIGNATURE RECOGNITION SYSTEM USING RADON TRANSFORM , GENETIC ALGORITHM AND NEURAL NETWORK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 6
Abstract
Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capability to reliably distinguish between an authorized person and an imposter. Signature verification systems can be categorized as offline (static) and online (dynamic). This paper presents neural network based recognition of offline signatures system that is trained with low-resolution scanned signature images using Randon Transform with Genetic Algorithm. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However human signatures can be handled as an image and recognized using computer vision and neural network techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are various approaches to signature recognition with a lot of scope of research. In this paper, offline signature recognition & verification using neural network is proposed with Random Transform and Genetic Algorithm, where the signature is captured and presented to the user in an image format and with the help of Randon Transform we extract total feature of signature and these features are train using neural network. Signatures are verified based on parameters extracted from the signature using various image processing techniques. The Off-line Signature Recognition and Verification is implemented using Image Processing and Neural Network Toolbox Matlab Software. This work has been tested and found suitable for its purpose.
Authors and Affiliations
Rabia Verma
System Security by Measuring and Analyzing Biological Data Authentication Modalities
Most biometric verification systems are done based on knowledge base and token based identification these are prone to fraud. Biometric authentication employs unique combinations of measurable physical characteris...
Wireless Networks Based Mine Detection Robot Using Embedded Systems
In the Real time Application the Detection and location of Bomb is highly essential in the field of Defense Applications. Considering the value of human life, the robot is allowed in the field to detect the bomb....
Increasing the Security Of Graphical Passwordauthentication Using Persuasive Cued Click Points Increasing the Security Of Graphical Passwordauthentication Using Persuasive Cued Click Points
Passwords are the standard usage for user authentication. Traditional passwords are easy to implement but faces several attacks. Alternatively graphical passwords are used for users authentication which provides m...
ASSESSMENT OF THE EFFECT OF PARTICLE SIZE AND BRIQUETTE TYPE ON THE BULK DENSITY AND RESISTANCE TO HUMIDITY OF SOME SOLID BIOMASS BRIQUETTES
Many developing countries generate millions of tons of agricultural wastes and forest residues every year. Handling and transportation of these materials which is difficult due to their low bulk density can easily...
A Techno-Economic Viability of a Residential Air Source Heat Pump Water Heater: Fort Bueafort, South Africa
The utilization of an air source heat pump (ASHP) to retrofit geyser can significantly reduce electricity consumption for sanitary hot water production. Furthermore, optimal operation of the system based on ambien...